Why Use Choicemail?

Because it works.

Spam now accounts for about two-thirds of all email. It costs most email users at least 15 minutes a day. Research shows that spam costs companies $400-800 per mailbox every year. And these costs are growing.

Permission-based email management is the only thing that actually solves, or ever will solve, the spam problem. (To learn more, read our whitepaper.) It is 100% effective, and ChoiceMail makes it available to you now.

With ChoiceMail, you will never get another piece of unwanted email because a message can reach your inbox in one of only four ways:

When you create a new email rule, you can define portions of text that must appear in an incoming message. For example, suppose you are subscribed to a list server that redistributes all messages from members of that group. In such a case, the sender might be different each time and you don't want to send registration requests out to everyone in the group. The ChoiceMail One user guide has more information on how to handle this example.

Conditions: You can specify text in various fields that will match with the same fields in actual email messages. The permission rule "triggers" when it matches with a particular message.

Actions: if an incoming message matches a particular rule, then the permission rule triggers and selected rule action is executed. There are currently nine actions available.

*Accept message

The message will be quietly accepted but the status of the sender will not change. In other words, the sender will stay in the unknown senders list.

* Delete message to junkbox The message will be quietly deleted to the junkbox but the status of the sender will not change.

* Delete message permanently

The message will be quietly deleted but the status of the sender will not change. Note that this action deletes a message irretrievably. You should only use this action after you have tested your rule satisfactorily with deletion to the junkbox so that you can get it back if you delete the wrong message accidently.

* Approve sender

The sender will automatically be added to your whitelist and all messages from that sender will be allowed.

* Reject sender

The sender is added to your blacklist and all messages are quietly deleted. This action is not used very often as spammers don't use the same email address each time they send you a message. Normally you will want to use one of the "Delete" actions

* Delete sender to junkbox

The sender is deleted from your system so that if they send another message, they will get a new registration request. All the messages associated with the sender are moved to the junkbox so you can get them back.

* Delete sender permanently

The sender is deleted from your system so that if they send another message, they will get a new registration request. All the messages associated with the sender are irretrievably deleted. Use this action only when you're certain that the permission rule is working to your satisfaction.

* Don't send identity query

This action converts the status of the incoming message to a "BCC" message which means that the sender and associated messages will simply STAY in the unknown sender list and ChoiceMail will not send out a registration request to the sender.

* Mark message as spam

This action marks the message as spam which, like BCC, means that the sender and associated messages will simply STAY in the unknown sender list and ChoiceMail will not send out a registration request to the sender. It's particularly useful for experimenting with permission rules since you can see the effects of changing your permission rules without actually having the message in question deleted. After applying permission rules, you can right-click on a message marked as spam and check the "Sender info" which will tell you WHICH permission matched that message. Once you're happy that the permission rule is working to your satisfaction, you can change the action to Accept or Delete as you wish.

Notifications: You can optionally associate a predefined message with individual permission rules such that when a permission rule is triggered, an email message can be sent back to the sender.

Misc: The text that you type in the field will be displayed when you click the Explain menu in the permission rules list.